← Back to AnnexesCrosswalk Overview

OWASP ASVS Crosswalk

Protective Computing extends application-security verification by requiring explicit public boundaries around coercion, data disclosure, and degraded-path behavior.

Protective controlASVS areaTranslationEvidence
User-held keys / no backdoorsCryptography / data protectionAdds a public prohibition on administrative decrypt capability.PainTracker mapping
Bounded egressCommunications / data protectionRequires intent-linked egress and threat-aware disclosure review.audit artifact draft
Coercion-safe limitationsArchitecture / threat modelingRequires the system to state what it cannot safely withstand under compulsion.coercion scenario packet, reference packet